Top 10 Black Hat Hackers Who Made History Forever

InShortViral: There are seven types of hackers some of them motivate other to become good hackers as White Hat Hackers and other motivate to become bad as we say Black Hat Hackers.

In the world, there are seven types of hackers some of them motivate other to become good hackers as White Hat Hacker and other motivate to become bad as we say Black Hat Hackers. These two hackers are at the top most hackers in the list, but rest includes Script Kiddies, Hacktivists, State-Sponsored Hackers, Spy Hackers and Cyber Terrorist.

And the topic is Black Hat Hackers who basically comes under the list of criminals, this hackers violates computer system programs for some reason and mainly for personal gain, illegal activity within the cyber web calls off about cyber criminals and thus Black Hat hackers does this by inserting the malicious content to another computer. There are no exact terms may be they are in a group or an individual working in the field of illegal hacking again for personal gain.

Top 10 Black Hat Hackers Who Made History Forever

Black Hat Hackers hack into the SSL or secure web servers or any computer to steal or destroy data and they can also make the computer network unusable, A black-hat hackers basically breach into the network system and get it compromises without the prior knowledge of the victim, this hackers get infringement access to the system or a giant network to accompany the technological advancement of the computer overall connected networks. Below we have Top 10 Black Hat Hackers who have made history for all seven hackers, might be called a personal experience of those black hat hackers.

Albert Gonzalez is a well-known hacker as well as a cyber criminal, with his own team he became the mastermind in stealing of more than 170 million credit cards and ATM details between 2005 to 2007 in which it claim the biggest claim in history. The techniques Gonzalez team using at that time seems authentical SQL injection techniques in which it generates the malware backdoor on several computer system, the office computer, home computers and mainly targeted corporates offices networks in order to launch packet-sniffing or ARP spoofing attacks into all those systems and networks to steal internal computer valuable information which worths in millions, later he was arrested on March 25, 2010 – with his team and seized $1.6 million in cash including $1.1 million found in a plastic bags stored in a drum which was buried in his parents backyard, he was sentenced for 20 years.

Vladimir Levin mainly becomes popular after he transfer US$10.7 million from Citibank’s computer network, he is a Russian-born belongs to Jewish family, Vladimir Levin lived a short life as a hacker because later on after stealing $10.7 million from bank he was arrested and the authority able to recover all only $6.7 million and the rest $400,000 has no record.

After his release he went to the United States in his trial he was told to coordinate the first internet banking raid. Later on, he committed that his ability to transfer Citibank customer funds to his own account which is through stealing the account numbers and PINs.

The more we go to the nearest numbers the more the 80s and 90s hackers will be revealed. Kevin Poulsen ’80s black hat hacker who hacked into the Los Angeles Radio KIIS-FM phone line which made him rich in one day to purchase a brand new Porsche, The law enforcement dubbed him “the Hannibal Lecter of computer crime.”

Kevin Poulsen didn’t stop here, he then hacked into federal investigation database. He mention rage during the hacking pursuit into the FBI federal computers to wiretap information, he usually became more famous in hacking telephone lines and connection criteria, later on when his photo shown in Unsolved Mysteries at that time he crashed 1800 telephone connection lines and at last he was captured in a supermarket and he was sentenced for five years, after serving five years in jail he moved on a right path and now he is a senior editor in Wired News.

In our number 7th Mr. Morris who become popular in 1988 after creating a computer worm which was considered to be the first computer virus he had created. Robert Tappan Morris known as an American computer scientist in 1986. Not only he created first computer virus but also being arrested in 1990 under Computer Fraud and Abuse Act. Previously he has been a student when he created that Morris virus while studying in Cornell University, he spread that Morris virus all over the internet which effects 6,000+ computers.

After this computer fraud he serves sentence for three years in federal jail for probation, Morris capture because of his own fault, before creating the Morris virus he gradually chatting with his friends and knowing ones about who he is creating this virus and that faced him jailed otherwise he have used his college name Cornell. he said would have said that the virus is originally originated from his college Cornell and he flew away from the case.

Michael Calce is a high school boy basically best known as ‘MafiaBoy’ from West Island also he himself moniker as Michael Demon Calce. he is the first person who launched DDoS which in terms Distributed Denial of Service attacks against a large number of multination companies websites and online services, firstly includes Yahoo!, Amazon.com, Dell, CNN and eBay. All this site already being affected but in terms of Yahoo! at that time it was the leading search engine who stopped working for one hour after the DDoS attack by ‘MafiaBoy”, Later on Calle arrested for serving Eight months in custody and one year of probation.

A boy calls himself as a hacker moniker “Hacker Posted Boy” Mitnick experienced an exceptionally pitched interest by powers. His wickedness was built up by the media however his real offenses may be less remarkable than his reputation recommends. He broke into DEC’s PC arrange and duplicated their product, a wrongdoing he was accused of and sentenced in 1988.

The Department of Justice portrays him as “the most needed PC criminal in United States history.” His endeavors were definite in two motion pictures: Freedom Downtime and Takedown.

Mitnick increased unapproved access to his first PC system in 1979, at 16, when a companion gave him the telephone number for the Ark, the PC framework Digital Equipment Corporation (DEC) utilized for building up their RSTS/E working framework programming.

As indicated by the U.S. Division of Justice, Mitnick increased unapproved access to many PC systems while he was a criminal. He utilized cloned mobile phones to shroud his area and, in addition to other things, duplicated important restrictive programming from a percentage of the nation’s biggest cell phone and PC organizations.

He Calls as George Francis Hotz also Geohot, he is an American hacker basically capable for unlocking iPhone devices, the hacking into the phone controls from another wireless devices, just irreconcilable of AT&T and Apple. the most important is he developed Limera1n jailbreaking tool and bottom to exploit iOS.

Gotz becomes the first person in 2007 to unlock iPhone devices, in his blog www.geohot.com he claims he had traded his second unlocked 8 G iPhone to the founder of Certicell Terry Daidone in which in return he got Nissan 350Z and three 8 GB iPhones. in 2010 he publically declares about his discontinuation in Jailbreaking activities also declare about his demotivation over hacking techniques and now wanted to get unwanted personal attention, now he is a software developer working with Sony Playstation.

Adrian Lamo is a Colombian-American risk investigator and program. He utilized coffeehouses, libraries, and web bistros as his areas for hacking.

Aside from being the destitute program, Lamo is generally known for breaking into a progression of prominent PC systems, which incorporate The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to The New York Times’ inward database of master sources and used LexisNexis record to direct research on prominent subjects.

For his interruption at The New York Times, Lamo was requested to pay roughly $65,000 in harms and was sentenced to six months house capture at his guardian’s home, with an extra two years of probation.

In June 2010, Lamo revealed the name of Bradley Manning to U.S. Armed force powers as the wellspring of the July 12, 2007, Baghdad airstrike video hole to Wikileaks. Lamo is right away filling in as a risk expert and gives his time and aptitudes to a Sacramento-based philanthropic association.

A real black hat hacker Gary McKinnon, In 2002, an extraordinarily odd message showed up on a US Army PC screen: “Your security framework is poor,” it read. “I am Solo. I will keep on disturbing at the most elevated amounts.” It was later distinguished as the work of Scottish frameworks executive, Gary McKinnon, who was blamed for executing the “greatest military PC hack ever”. He is blamed for hacking into 97 United States military and NASA PCs over a 13-month period between, utilizing the name ‘Solo’.

The US powers claim he erased basic documents from working frameworks, which close down the United States Army’s Military District of Washington system of 2,000 PCs for 24 hours. In November 2002, McKinnon was arraigned by a government amazing jury in the Eastern District of Virginia.

After the September 11 assaults in 2001, he erased weapons logs at the Earle Naval Weapons Station, rendering its system of 300 PCs inoperable and deadening weapons supply conveyances for the US Navy’s Atlantic Fleet. He is likewise blamed for replicating information, record documents, and passwords onto his own PC.

The arraignment contained seven numbers of PC related wrongdoing, each of which conveyed a potential ten-year correctional facility sentence. The court had prescribed that McKinnon is secured to the United States to face charges of illicitly getting to 97 PCs, bringing about an aggregate of $700,000 in harm.

A 16-year-old dark cap programmer Jonathan James turned into the first adolescent detained for cybercrime. James picked up his reputation by actualizing a progression of effective interruptions into different frameworks. In a mysterious PBS meeting, he proclaims, “I was simply glancing around, playing around. What was a good time for me was a test to see what I could draw off.”

James’ real interruptions focused on prominent associations, for example, NASA and the Department of Defense. He broke into NASA PCs, taking programming worth around $1.7 million. He likewise hacked into the Defense Threat Reduction Agency and caught more than 3,000 exceptionally hidden messages going to and from the DTRA representatives, while gathering numerous usernames and passwords.

James conferred suicide utilizing a weapon, On May 18, 2008, at 25 years old. His suicide was obviously spurred by the conviction that he would be indicted for violations he had not submitted. “I truly sincerely had nothing to do with TJX,” James wrote in his suicide note, “I have no confidence in the “equity” framework. Maybe my activities today, and this letter will send a more grounded message to the general population. In any case, I have lost control over this circumstance, and this is my best way to recapture control.”

AUTHOR

Manpreet Singh is young Entrepreneur who is managing Tech Viral & Also an aspiring blogger and Chief Editor for Tech Viral. He is an Experienced Blogger, SEO Expert, Digital Marketer, Certified Web Developer & Social Media Expert.

TRENDING

Tech Viral App

ABOUT US

Tech Viral is an all rounder in tech field. We work hard to serve you first and best of all and to satisfy your hunger of Technology. Here you will be updated with latest tech related tech/hacker news, hacking tutorials related to various security tips from latest vulnerabilities and lots more.